Wireless networks are all around us -- from Wi-Fi and Bluetooth to Zigbee and Z-Wave, all of which are vulnerable to interception and manipulation. While some organizations can still operate effectively in a completely wired environment, many corporate environments require wireless networks due to the increase in company smartphone usage and the portability needs of their employees. Wireless networks are inherently insecure, but there is one element of hope to safeguard wireless communications comes down to one thing: Encryption.

What Makes for Effective Encryption?

Generally, the effectiveness of encryption boils down to three things:

Strength of the encryption algorithm

Length/size of the encryption & decryption keys

Implementation

Security Illusion comprehensively assesses each of these categories to provide our clients with the best possible insight and visibility to any vulnerabilities potentially affecting their current wireless networks. In the case of Wi-Fi networks, we actively attempt to exploit your wireless networks with the ultimate objectives of using it to gain access to your internal corporate environment, compromise user workstations and servers, and intercept sensitive network traffic.

Security Illusion has worked with some of the world's most well-known vendors to perform security assessments on never-before-seen beta devices using completely custom and proprietary wireless protocols. We've performed security assessments on a wide range of wireless devices, such as smart home devices and sensors, Wi-Fi access points, security cameras, children's toys, baby monitors, and custom physical (yet digital) credit cards that operate over Bluetooth.

A few common Wi-Fi security tests that our clients ask us to perform:

Wi-Fi encryption strength

Can it be compromised directly through known exploitation methods?

Strength of the wireless key or certificates used

Indirectly gain access to the Wi-Fi by manipulating already-connected client devices on the Wi-Fi network

Spoofing SSID Access Points

Compromising the connected workstation (directly or indirectly), then subsequently revealing the passphrase or certificate used for wireless access

Guest Access & Isolation

How is guest access to the wireless network managed?

Can guests on the wireless network identify one another?

Can a guest (or malicious actor) pivot from the isolated guest environment to the internal VLAN that contains employee workstations, share drives, printers, and servers?

Want to know if your wireless networks are vulnerable?Let us take a look.